Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Partner Perspectives //

bitdefender

1/19/2017
11:00 AM
Liviu Arsene
Liviu Arsene
Partner Perspectives
Connect Directly
Twitter
Google+
LinkedIn
RSS
50%
50%

What to Consider When Moving To Hyperconverged Infrastructure

Scalability, data availability, and agility are three reasons why enterprises are making the move to HCI.

IT decision makers have been tasked with the challenge of not only expanding the technical capabilities of their infrastructures, but also with providing high availability, scalability, simplicity and security. Digitalization has transformed the way businesses operate and boost revenue. To that end, Gartner has recently estimated worldwide IT spending will reach $3.5 trillion in 2017.

Moving to a hyperconverged infrastructure (HCI) offers significant benefits for large organizations, as software-defined datacenters (SDDC) reduce the complexity of managing multiple hardware and software platforms, and lower operational costs by using hardware as a single pool of resources shared across multiple applications. IT decision makers often have to present these two main benefits when facing the board of directors, but the decision-making process should also consider business continuity and the ability to quickly meet new demands.

Scalability
Hyperconverged integrated systems and infrastructures let organizations quickly deploy new services and applications without the cost of new hardware or upgrades. Because the SDDC revolves around the use of commodity hardware, the software layer is actually designed to manage aggregated resources across multiple individual nodes, focusing on mass centralization and integration. Reliance on vendor-specific hardware becomes obsolete, allowing more flexibility and efficiency.

Data Availability and Mobility
Agnostic components ranging from hardware to hypervisors and other technologies allow data to move fluidly between services and applications, meeting SLA requirements. Hyperconverged infrastructures allow different storage tiers - solid-state storage and spinning-disk – and see beyond the input/output blender by optimizing storage resources based on the individual profile or requirements of each VM.  Resource pools also allow for resource islands that serve the requirements of specific applications, allowing administrators to focus on applications instead of allocating resources.

Agility and Automation
Because software-defined datacenters place all physical resources under a unified administrative umbrella, IT departments can migrate workloads a lot faster than in legacy systems. This means they can also focus more on scripting and activity scheduling, without worrying about compatibility with vendor-specific hardware and products. Having everything in a single environment that can support VMs and policy management across the entire infrastructure makes the SDDC a highly agile environment.

Bottom Line
HCI and SDDC can help businesses decrease their total cost of ownership while rapidly delivering applications. Because the infrastructure stack is highly simplified and abstracted, businesses and organizations can focus on application mobility. While from a CAPEX perspective hardware acquisition is somewhat similar to legacy datacenters, from an OPEX perspective, costs can be significantly reduced.

Liviu Arsene is a senior e-threat analyst for Bitdefender, with a strong background in security and technology. Reporting on global trends and developments in computer security, he writes about malware outbreaks and security incidents while coordinating with technical and ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19698
PUBLISHED: 2019-12-10
marc-q libwav through 2017-04-20 has a NULL pointer dereference in wav_content_read() at libwav.c.
CVE-2019-4428
PUBLISHED: 2019-12-09
IBM Watson Assistant for IBM Cloud Pak for Data 1.0.0 through 1.3.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session....
CVE-2019-4611
PUBLISHED: 2019-12-09
IBM Planning Analytics 2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 168519.
CVE-2019-4612
PUBLISHED: 2019-12-09
IBM Planning Analytics 2.0 is vulnerable to malicious file upload in the My Account Portal. Attackers can make use of this weakness and upload malicious executable files into the system and it can be sent to victim for performing further attacks. IBM X-Force ID: 168523.
CVE-2019-4621
PUBLISHED: 2019-12-09
IBM DataPower Gateway 7.6.0.0-7 throug 6.0.14 and 2018.4.1.0 through 2018.4.1.5 have a default administrator account that is enabled if the IPMI LAN channel is enabled. A remote attacker could use this account to gain unauthorised access to the BMC. IBM X-Force ID: 168883.